Name Jagbir Singh NetID jcha509 Group Number: 522 Website Link: http://infosys1102014s2group522.blogspot.co.nz/ / Tutorial Details Tutor: Day: Time: Kayur Wednesday 4pm Time Spent on Assignment: 30 Hours Word Count: 1566
2
2 SECURITY COMPROMISE INTRODUCTION One of the biggest problems society faces in todays technologically advancing age is the risk of your privacy being compromised with ever growing hacking, scamming, identity thefts, Spyware etc. occurring amongst us. 70% of New Zealanders have suffered and have been targets of some form of cybercrime. From here it is appropriate to say that we require a tool that can actually protect us when performing a wide range of actions on the web from protecting us in the less important areas such as, logging onto Facebook, Email, YouTube to being able to protect us in the major aspects like online banking, and online transactions when buying or selling etc. This is an issue that is a threat to our reputation and safety. There must be a system in place to combat this breach of security, so this product is what is called The Security Skin, an available means to prevent identity theft and secure your presence when on the internet. 3. BUSINESS SECTION 3.1 Vision To provide security to people so they can rest easy that their sensitive information will not be compromised. (unisyssecurityindex, 2014) 3.2 Industry Analysis: Security Software industry Industry: The Security Software industry is security that is applied to computing devices, and provides protection of information assets through the use of technology and processes. Force: High/Low: Justification: Buyer power: High Other options to choose from, however still quite different to them. Supplier power: Low Industry suppliers such programmers and server providers do not offer an exclusive product, and
3
3 there are many choices of suppliers from around the world, servers can be built from anyone. Therefore, supplier power is low. Threat of new entrants: low Barriers to entry are high the infrustructure costs and finding the right kind of labour to produce such code, is very difficult to establish and maintain. Threat of substitutes: low The only real substitue is antivirus software, and even this is incapable of providing security to such a veriety of things such as your operating system. Rivalry among existing competitors: Low As there are not many. Overall attractiveness of the industry: Therefore, the industry is attractive overall, despite high buyer power, due to the other 4 forces being low. 3.3 Customers and Thei r Needs The customers are almost everyone and anyone with electronic devices. Nearly every device will have an internet connection or will be connected to some other kind of network, thus making it vunerable to attacks by hackers etc. around the world. So In order to securitise their information they need something which will enable them to protect themselves from the world. Something reliable that once applied to their device will block and not allow any unwanted business. Unauthorised access to or misuse of personal data was the top security concern for New Zealanders aged 18-34 years with 70% being extremely or very concerned about this issue.
4
4
3.4 The Product and Service The customers are being acknowlegged and are being listened to and understood. The stats clearly indicate the need for protection. Our Skin will provide this cover and advanced authentication to proactively protect against attacks on sensitive data and information. Once this comprehensive yet simple software is installed into your system it will immidiatly take over and begin its protection procedures. The software and codes will automatically update regularly in order to keep taclking with the new hacking techniques being developed. Compatable with any device be it Smart phone or PC, its complex code is scalable and will efficiently lock around any system code. 3.5 Suppliers and Partners One of our partners will be the android team from Google. In order to implement the skin onto different platforms, we need the root access within Android's sub-system. Our application requires administrator level permissions, to operations that are otherwise inaccessible to a normal android application. These special permissions are needed implement the skin around the source code of the operating system and the applications which are pre-installed onto the system or which will be installed in the future. Our other partners will be Application monitoring engines like New Relic these tools will help us build high-performance software. These monitoring engines will help us monitor Skin real-time as skin performs on different systems in different situations. Partnership with these monitoring engines and their services will allow us to identify if there are any performance issues caused by skin and find any missing loopholes where the performance skin is affected Our suppliers will be the developers and designers. Developers will write and manage the software.
5
5 3.6 Strategy: Overall Cost Leadership Strategy Our competitive scope is the broad market. We aim to capture the wider audience anyone who wishes to stay protected from elements that may cause damage to your data or privacy. As we are aiming and targeting such a wide audience we also see that for the competitive advatage we are based on the low cost as once the software is made it can simply be duplicated further so it is appropriate to be in this low cost area. We are increasing profits by reducing costs, while charging industry-average prices. We are increasing market share through charging lower prices, while still making a reasonable profit on each sale because we have minimal costs after we have made the software. Therefore this is a Cost Leadership Strategy. 3.7 Value Chain Activity: Technology Development We must develop and engineer unique features and a user friendly interface in order to differentiate from our potential competition so that The Skin can never slow the system down and will never cause lag or lead the system to crash. Research and development means we can carefully analyse our customers needs and develop that meets those needs while we also examine new techniques of hackers etc. and how to develop The Skin to combat that. 3.8 Business Processes 3.8.1. SOFTWARE DEVELOPMENT PROCESS The process begins by the employment of developers who can handle the job of creating such software that the vision describes. Experienced staff is employed to design and prepare an intuitive design. Designers then create a mockup interface allowing for later assessment if it has fails then the design is sent for improvements and then once again enters the normal process of assessment. If yes then the design is passed on to the developers who will then create a full working model of the software, the software goes through a bug assessment to check and inspect of any problems that may cause the software to crash or give-in to cyber-attacks if there are problems then they those issues are solved and then goes back to the bug assessment. Once the software is running efficiently and as it should it is then published to different platforms, so the process ends.
6
6
7
7 3.8.2. SOFTWARE USAGE PROCESS - The process begins where the user will install the software, as soon as it is installed The Skin is activated and encryption is implemented across the whole system. When the user downloads a new application, skin simultaneously starts scanning the application for threats, which my upload personal data to unsecure servers. If any threats are detected, the application is terminated and the system is secured from threats. If the application does not possess any threats then the application is successfully installed. The application also gets encrypted by skin which prevents it from unwanted internet access or access to other networks.
8
8 3.9 Functionalities 3.9.1. SOFTWARE DEVELOPMENT PROCESS Creating a software scuccessfully protecting users. Testing for issues and so making improvements. 3.9.2. SOFTWARE USAGE PROCESS Prevents and defends against cyber atacks. Creates a cyber Skin and scans and checks for threats when downloading. 3.10 Systems
3.10. 1. DATA MANAGEMENT SYSTEM (TPS) The data already available to us, should be used so that we can understand the different threats that are posed to device users around the world. Once we have this knowledge we are able to then observe how some of these established viruses etc. can be stopped. These stopping and prevention mmethods can be implemented to our Skin. This will help us to regularly update our software. 3.10. 2. SOFTWARE USAGE SYSTEM - 3.10. 3. CRASH REPORT MANAGEMENT SYSTEM When ever there is a crash in our software in the users device, this sytem must be in place in order to inform us as to why this has happened, which will help us to answer the question Was the crash due to our own system faliour? or was the crash due to the device being shut down unexpectedly. It is important that we can get answers to these questions as it allows our software for continuous deveopment.
9
9 3.11. Summary Table: Value Chain to Systems
Value Chain Activity Processes Functionalities Specific Information System(s) Broad Information System(s)
Bavarian bergkase fromage queso 1. Software Developmen t Process 1. Creating a software scuccessfully protecting users.
2. Testing for issues and so making improvements. DATA MANAGEMENT SYSTEM
TPS
2. Software usage process 1. Prevents and defends against cyber atacks
2. Creates a cyber Skin and scans and checks for threats when downloading.
CRASH REPORT MANAGEMENT SYSTEM
10
10 CONCLUSION It is obvious that ever growing hacking, scamming, identity thefts is big problem and must be dealt with. Skin is a simple solution to put an end to this problem, by completely securing the users system skin makes online banking, and online transactions very unproblematic. While protecting the users identity, skin secures the users system from unauthorized breaches. REFERENCES
1. Baltzan, P. Blakey, P. Lynch,K. Business Driven Information Systems 2 nd edition, McGraw-Hill Austalia Pty Limited, 2013
2. University of Auckand, Infosys 110 business systems couse book, 2014
3. Projectauditors, (2014), projectauditors, Retrived from www.projectauditors.com
4. Unisyssecurityindex, (2014), unisyssecurityindex, Retrived from www.unisyssecurityindex.com
5. Impactlearning, (2014), retrieved from http://www.impactlearning.com/how- to-satisfy-customer-needs